With cybersecurity scams around every corner – can you afford to wait?

Brett Harney Network Security

Unless you’ve been living off the grid, you’ve probably heard about the exploding number of cybersecurity threats popping up everywhere. And it’s not just global statistics we’re talking about. Even state and local governments are coming under assault. Baltimore is the latest US city targeted with a ransomware attack, following smaller security beaches in towns like Greenville, NC, and Allentown, …

Spoofing

Spoofing: an easy way to get hacked

Brett Harney Business Continuity / Disaster Recovery

The first thing you want to do is determine whether your account has been compromised by a virus, malware, or a spammer, or if you are just being spoofed. Email spoofing is when the sender of an email, typically spam, forges (spoofs) the email header “From” address so the email being sent appears to have been sent from a legitimate …

compliance

Is Your Business Compliant With Cybersecurity Laws?

Brett Harney Network Security

Cybersecurity used to be considered “an IT issue.” Keeping data and files safe was the domain of the CIO, and no one else paid much attention as long as operations were running smoothly. Because data has become an enormous business driver for all types of companies, and cybersecurity laws have become stricter and more specific to address the growing risks …

Hacker Convention Warns: Don’t Allow Your Network to Be “Faxploited”

Brett Harney Network Security

There are plenty of access points for a hacker, and they’re often tied to our very high-tech devices – all the pieces of hardware with “smart” in front of them for one example. But sometimes our dinosaurs, the work-horse predecessors of our fast-paced IT, are the ones holding open a back door for security weaknesses. At Def Con 26, an …

5 Network Security Pitfalls Putting You at Risk

Brett Harney Network Security

Security is rightfully at the forefront of most business owners’ minds. There are new breaches reported on every day and no size business, from major enterprise to SMB, is safe from being targeted. There are many options for hardware and software that provide protection, but a network security policy is just as critical. Many times, though, we find that these …